Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-10-2024 20:31
Static task
static1
Behavioral task
behavioral1
Sample
36ab4cddf868fa84baf4eec4e274f27c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
36ab4cddf868fa84baf4eec4e274f27c_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
36ab4cddf868fa84baf4eec4e274f27c_JaffaCakes118.html
-
Size
1KB
-
MD5
36ab4cddf868fa84baf4eec4e274f27c
-
SHA1
fb8609469a5ec462ca2641b4861225ce47918e52
-
SHA256
b27c1c267362c40b16067892ee7bfa5017de203553441ffe987177a4d9736143
-
SHA512
c9b9e95c33df5e62ea9e2bafbfbfc25e3e013a903e9ce4749b985c1cf3e98e44dfe77ae5b8747fd405163ce0754fc79af259675900a15b82201eaaebb934ce99
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7008f0ae1c1cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf6000000000200000000001066000000010000200000008a113e92451cfe4fa3b974193f4708757c32badf5ef55abeec9f561ed13db818000000000e8000000002000020000000c0fc04ddaab21753106c77ad1762b5f9c38389531969e04027272e9ffa6e07b620000000d6f8ba74b2054788a5a12184d1b926392870ec0a530dfacee2c2c6baf71353d040000000ba4d2fb377a2b78d805c3611d2ead8d399282f0afccf230861f4b9209846b17e7dc1675f90576fef10ddc2c4b65fbfaaf49376f57902b03d2bb9455a944ff8ab iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DA7367D1-880F-11EF-875C-F2BBDB1F0DCB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434840581" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1708 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1708 iexplore.exe 1708 iexplore.exe 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1708 wrote to memory of 2440 1708 iexplore.exe 30 PID 1708 wrote to memory of 2440 1708 iexplore.exe 30 PID 1708 wrote to memory of 2440 1708 iexplore.exe 30 PID 1708 wrote to memory of 2440 1708 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\36ab4cddf868fa84baf4eec4e274f27c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1708 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2440
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5657ff384bd8dea646f10d0e0911ecea9
SHA1f34f1b8189cf80914da73b6cf64753a6b2b89b71
SHA2568615a8f78f8d1c297c354263ef1d2426d655794442b7c2548b80098284aac474
SHA512359d9cd1ceb8fced16ccefd1a9a8f6b91f5b29016b23d8c4a7681cdf1484b637db5eef5d0c113bff09563d905d7221f87ae69f8cd4432650e8f7c091b56a6207
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7d89177af0a1ee2a300cc80a949985b
SHA1c7dd77d0b204290e93831e33426a01295f7ef69b
SHA256f73d59fe173a08319be6e787ea7d8ee079c97bfad3654b5b0f3cc66c0cc9054d
SHA5125f61046c9c39192772feb2d276a887f0cf541e2dea4504eed7d326890af6757899402a379781b0d8f9a3e0adc7ebc64cda58de4409c45a676685835e98dd7541
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b19df896d3043bb14f60db22614273d2
SHA12efa7ec860d43b8657a819b4db2ce06419156049
SHA256c60bf04ea384f4bab8dcd960f6f47471ce3454aa9ce9988ed977c5768aa2a5a9
SHA51236621f54a5819df4602ffb915a441fe6a0a11fd0335bccd194b23b9f8246aa4ba2b55d5da95469252e18f55be29dd99ceb5d91f11d3aeabdafd608b2a60e0b53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca4752e9b6c9dbd351abbe14cd122e93
SHA11378b908e5469fba0f7958087966ab899a2dbcc0
SHA2565f51b8b048b61a08530ccf2f64c871abdee94b2cdc95c9dc86f0c04c4ecef184
SHA512cc3f160df35b69ffa1bfb1531dcc233cdf4bf656de619871854d3dcd96f657fb0b382280dc13ac99ce1767d5607a29442d02072aeacda4a05a666e1bfe5bc86d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3727f3f2226d424291adf0dc5eb4b51
SHA1e8bb0782c5f8e81fa16b29709f7107fb305b15a6
SHA256aecf83304a75eccb384b32ffafe61258df7a38c07b0d5c39a83233cbbdf2ca53
SHA51235bab6c5c59b28acd3a37408db64b7147b6db2867cfae9e603647db008f13907ad0076a54d5af8982136f2c8e792f679961a642280155e87b904df2ea64f4441
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59aec7b2c51b91b2b398df0edfc45417f
SHA195c813f659e3b4e848d195fd1aed9be893739ecf
SHA256daedecb1e6ef05b059873984f7d85b4b004ae9aacc2254ae87db81d80f86fc5f
SHA512a0e88252287b04a874d9f3f243cc738604adff78d0c7a908ab3bece026c23d835d3c32e3c2b93c3ddf56478682dd8d55f0cf89aad3b4bee4c728da095336c831
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533249891a7d96931c7ee3d0d0601ae32
SHA11a1657bd4d4f7da7335609145a62b7a32c036080
SHA256639a53922f9e4d36d790246c5ef985fedf79aeedd65d0b09fa0d13b16fca3fb2
SHA512d507a0c4c5e6c1894e19fd1e83c012b69c6f39eff9fb1e98583d0a7711902b025447a518e6ee61f9f5e86934ae85fc368b651930a2a4ea5a7a353ce57b7f877c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c7654f17299aa675de6f2f2cc897e78
SHA1ec4864a3649f2dc6b41747a2714fd574f3f9713d
SHA25663f88b6afa0068debb3de033ee3332460e1023a2763639cf46a42b9758a936c7
SHA512d396e1fa984aa19202a3c4b38eaf878e633fa6e0eda41be6b4630fb534e90f56324002b059640b8ba9f68a3ee28c782a77bfea7d44c1dfa0715d247c6e53169a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba269de66aadb08cefab27e09dfd7f39
SHA18a37bf7023765fe1079373d03b2dcc133663cfd1
SHA2566263b68f451249c99ae9e5007a2cf7b9f4607dacdc5446cb7ae867f5036e59cc
SHA512861b6f4fc9216e53a170b2892c364dd5d19da364933a3feb586d52393ef395982249ac0168fcc91f87775415881944cd61f55273fde42f1f7ae4f8139d0704d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4cb4be2b02286474eee4cea28e5ff2b
SHA1c9d92e743afec6c0ac37f8086e97c85556065b28
SHA256bd9532c0bac1a035ed224b8f50fca60ef4dd7e38d4c707d9637a3b04e4bf6c9d
SHA5122de3826bf728801b2b1e029c5fb35059e860401cdb5193d8ee85fe87cd60246b4079b77b8a9cc1ad1a1e1ddfc22ac0afdaeadad3351b0d12be5b2af52568fd23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e36206a6e023410bf1f713c0771383ef
SHA1ad2c9efa91a4f496fbcfc279e9cb308191245bd0
SHA2569a3cb72f3410c35f538413b56615fa2569112f6d7cf06178f51740627a431942
SHA512474deba9a7caa113dc1bc89a7c40008e0304ea88823b923bd3cfa5dc50a394d4f0d53171c43219b5885f311d646477497c3f956527ecfb7a317f91892b0c5eca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58543f5a327772ee98af29440c193a802
SHA1d9c5a546c1981baa61f3e0ce3471487e74b9752a
SHA2563dc2c9bff32cf8d47fa0b4a21baed9ef895782eb24a1b5576d741b6403307ee7
SHA51233e72c1aa3acf1ceaa3e8f968e39ab0e14f3484a51e73097dafca97046ac321515276aa7e9734919609e76613b7dd858a663b18c66edff6d443b0b06c77d2143
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c404ba5a81f72e642f51bbdcc1aa5b4e
SHA1f387fe9e3bc1df06419991a2518b04beb1b0bc95
SHA256be5c2b12b4375f40502fd403c8b9290c2c647dae10be5574f333f1454790d84a
SHA512182fa7dbb45f8392b745d8acec45e963196d929bb27f7dacb18339dbb6704cd2d89ac5bef807635aa7e509fb84230ce368c30abc2ba5fca15782b556afde375b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d11a7d63ffee47d913e910d3a028949
SHA1da4bfd9fbfbff269f08c45358a9cda7fe0292b6b
SHA25649c7cb2bf5479d0149367e1b5e1477831136f1ca8cd8795e0fe27641ea4690ce
SHA5120ea501e7a6bc4208ee956776a4c8f8b736a23a4d2f3011f244e96db51773607bac3615bbed243f4638246fbc4172fd8a4e7b8d5e458511b9ac7fde304004ff14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c1ed220f2426a5baac5b3c4049a6e2d
SHA1cd39d49cfc6b7dc5adc3d4b4b4812e86ad37421d
SHA256dc3172f191bee95844504e5c11125fdf3eb16e2c67e42669f4c214f926f37674
SHA5125a732fe08e8f934a92c6f3b225e0fc116121b1e824d96a6d368be1ca71ddd5530ff0b44e5a9c0d3cea75ac0e426d69edaa0111600ea5039bc829c5341bd8e243
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56954e8def53693d0f7d64702185c5858
SHA11464fe7cfbad85ade3c483f4d44c55c4d0b1edf1
SHA2566b68f7c9f9c933f3cb2401104e6c52b549c60c234c934cdcfb4fa906ea80effc
SHA51295121c373581e33030f08feebaa22103fd5137ce1c35b9b76fad748f098cc8a28f747f018ade4fb09baf21c72c1b7a360903c74828152748629df5db9cef8c65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7e06cbba888e84dbda840d0480cff6d
SHA16bd07ec8fe1f607e31644e28fd94485ed57e760e
SHA256ec6fdaa502b9eb3c66eba9ec62330dc74e5d3713684058f09bc1ae7c0cb84bc4
SHA512092e64d83162f38a63d4ccf6be8f0f063ca4d3c7ff3bbcd0863d262ad9ecbb21814e5776073a0f70c004d54cf9444717d412b48d4a604c9e99afd402ee4a3813
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5471fa897400f9d2d485d656ad9fd5f0c
SHA10a48db9af5975cd800234b1ebd5b9b5860c60a58
SHA25693400b349bf4982d6a862aac4ba54e474473ee5befd5b59e12bcb694fcb59355
SHA512851967c0151702f7b967643df8480cb5814503c403cfd1e957f4e07eb7fba9d6f9826c44c3b448238704ee64a023edae2a102ca6bffc30cec7fc7d3080591a9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505d30ba08034504283b32eba941b39d4
SHA1283283848a43b8de80ece63a478208d58eafb6d2
SHA256cd3a464c63732f79dbb2400c93e93d06a1a48fe153facb88669879d03d3734dc
SHA512b26cd742a306a103295a442cf5c1f76abae7204266151013a2c9504f9e96e02e0e36999d861aa6383b7fe349877915ef7127603a7f172881038a63d2f6996797
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b